SONICWALL SECURITY HEALTH CHECK SERVICE

Similar documents
SONICWALL SECURITY HEALTH CHECK SERVICE

SONICWALL SECURITY HEALTH CHECK SERVICE

SONICWALL SECURITY HEALTH CHECK PSO 2017

10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control

THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE

Achieve deeper network security

10 easy steps to secure your retail network

EXECUTIVE BRIEF: WHY NETWORK SANDBOXING IS REQUIRED TO STOP RANSOMWARE

SonicWall Secure Mobile Access

SonicWall Mobile Connect ios 5.0.0

Cloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud

MySonicWall Secure Upgrade Plus

SonicWall Security 9.0.6

SonicWall Global VPN Client Getting Started Guide

SonicWall Web Application Firewall 2.0. AWS Deployment Guide

July SonicWall SonicOS 6.2 Upgrade Guide

Cloud Access Manager SonicWALL Integration Overview

SonicWall Secure Mobile Access

SonicWall Mobile Connect for Chrome OS

Cloud Access Manager Overview

SonicWall Content Filtering Client for Windows and Mac OS

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide

Dell One Identity Cloud Access Manager 8.0. Overview

Dell SonicWALL SonicOS

SonicWall Security 9.0.5

Dell SonicWALL Security 8.1.1

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

SONICWALL GLOBAL MANAGEMENT SYSTEM

SonicWall Mobile Connect for Android

SonicWall SonicOS 5.9

WHY YOU SHOULD CHOOSE SONICWAVE WIRELESS. Top 9 Reasons Why SonicWave is the Best Wireless Solution

Future-ready security for small and mid-size enterprises

Product Release Information

SonicWall Analyzer 8.4 SP1

SonicWall Analyzer 8.4

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

NEXT GENERATION FIREWALL. Tested Products. Environment. SonicWall Security Value Map (SVM) JULY 11, 2017 Author Thomas Skybakmoen

KACE GO Mobile App 5.0. Release Notes

Polycom RealPresence Access Director System

Quest vworkspace. What s New. Version 7.5

FIREWALL BEST PRACTICES TO BLOCK

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Empower stakeholders with single-pane visibility and insights Enrich firewall security data

One Identity Defender 5.9. Product Overview

Security Assessment Checklist

SONICWALL GLOBAL MANAGEMENT SYSTEM Comprehensive security management, monitoring, reporting and analytics

SonicWall Analyzer 8.4

BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS

Simple and Powerful Security for PCI DSS

SonicOS Platform. Firewall features

Customer Support: For more information or support, please visit or at Product Release Information...

Security Architect Northeast US Enterprise CISSP, GCIA, GCFA Cisco Systems. BRKSEC-2052_c Cisco Systems, Inc. All rights reserved.

Security+ SY0-501 Study Guide Table of Contents

Dell SonicWALL SonicOS 5.9 Upgrade Guide

SonicOS 5.6 Feature Overview

SonicWall Content Filtering Client 3.1. Agent Guide

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

Cisco Meeting Management

Abstract. Introduction

2017 Annual Meeting of Members and Board of Directors Meeting

SonicWall GMS 9.0. Getting Started Guide

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Cyber security tips and self-assessment for business

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

IC32E - Pre-Instructional Survey

KACE GO Mobile App 4.0. Release Notes

Securing Your Most Sensitive Data

Quest Collaboration Services 3.6. Installation Guide

You Can See Everything From Our Windows

What s New in SharePoint 2016 and Office 365

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

KACE GO Mobile App 5.0. Getting Started Guide

SonicOS Enhanced Release Notes

McAfee Network Security Platform Administration Course

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

KACE GO Mobile App 3.1. Release Notes

SonicWall SMA 8200v. Getting Started Guide

Evaluation criteria for Next-Generation Firewalls

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

VIVOTEK. Security Hardening Guide

Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection

Polycom RealPresence Access Director System, Virtual Edition

Spotlight Management Pack for SCOM. User Guide

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

One Identity Starling Two-Factor HTTP Module 2.1. Administration Guide

Security for the Cloud Era

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

One Identity Starling Two-Factor Authentication. Administrator Guide

Reviewer s guide. PureMessage for Windows/Exchange Product tour

SOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management

SECURITY PRACTICES OVERVIEW

One Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide

SonicOS Enhanced Release Notes

SonicOS Release Notes

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016

User-to-Data-Center Access Control Using TrustSec Design Guide

Transcription:

SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service is designed to provide customers with a comprehensive review of their SonicWall network security posture and identify any security gaps that need to be addressed. The Advanced Services Partner will provide their customer with a Health Check Report that will include findings and any recommended actions to be taken. This may include specific SonicWall configuration optimizations that can evolve in follow-up remediation projects, but also more general and network-specific optimization suggestions that may result in follow-up projects such as network migration to a more efficient network topology. This guide is intended to provide SonicWall customers with a clear understanding of what the Security Health Check Service entails.

In-Scope Activities The Security Health Check is a one-day service that reviews existing configurations to ensure best practices are followed in following areas. Overall Appliance Status Check Firmware Version & Review of New Releases Licensing Review Network Security Best Practices Checks NAT Policies & Port Forwards Firewall Access Rules Inter-Zone Access Policies Wireless Configuration General Settings & Policies Users Management & Access Configuration Application Visualization & Control VPN Tunnel & SSL-VPN Configuration HTTP & WAN Management Logging Configuration Security Services Status Checks Content Filtering Service (CFS) Gateway Anti-Virus (GAV) Intrusion Prevention Service (IPS) Anti-Spyware Geo-IP Filtering Botnet Filtering Deep Packet Inspection for SSL Traffic DPI-SSL Deep Packet Inspection for SSH Traffic DPI-SSH The Security Health Check Service partner may also provide recommendations around the following areas: New service implementation (SSO, LDAP, Two-Factor Authentication ) New product deployment and network integration Network segmentation, encryption in transit and remote access planning (Annex) Design best practice workshop planning Product migration and configuration translation Out-Of-Scope Activities The Security Health Check is designed to be a one-day, best-practice security evaluation and validation service. The scope of the service is determined based on size and complexity of customer environment. As such, this service does not include on-site configuration optimization, with the possible exception of license syncronization or Capture ATP activation, should either be necessary. Remediation services are follow-up projects derived from conclusions of the Health Check Report. The above in-scope activities will be treated as best effort and focus will be given to areas relevant to the customer environment and elements deemed higher priority. Configuration of the following services is not included in the scope of this work, but can be offered as follow-up activities per customer request: General Configuration & Implementation Global VPN Client / SSL-VPN Single Sign-On (SSO) Comprehensive Anti-Spam Service GMS Analyzer Support Case Follow-Up & Fix LDAP/Radius Authentication WAN Acceleration Virtual Assist Enforced Client Anti-Virus Training Sandwich Firewall High-Availability / Clustering Product Feature Testing Sonic Point Configuration 2

Security Health Check Report At the conclusion of this one-day service, the customer can expect to receive a report from their SonicWall Advanced Services Partner. This report will document the status of each of the security services and configurations that were checked and offer any recommendations for security posture improvements. The table below provides an example of such a report. Sample Report: Security Health Check NSA2600 BEST PRACTICES PRE-ENGAGEMENT STATUS RECOMMENDATIONS/IMPLEMENTED FIXES General System Status LDAP Connection should be changed to TLS. Currently running on unsecured 389. Inter-Zone Access Policies Delete unused Zones (such as WLAN, which had multiple Access Rules set on). WAN Failover & Load Balancing Routing Policies NAT Policies/Port Forwards DHCP/DNS Configuration External port-mapping (NAT w/ source = any) should be limited to known source IPs. External RDP connections for IT admin should not be allowed (instead, IPSec/ SSL-VPN should be configured to allow access from the outside to RDP). As the first choice, an internal DNS Server IP should be set. Wireless Configuration Firewall Access Rules App Visualization & Control Firewall Settings A review of existing rules should be done. On remaining rules, enable Geo-IP and Botnet protection services., pending a reboot. This will allow further flow granularity views, such as inspect flows by country of origin. Enable TCP/UDP/ICMP Flood Protection. VPN Tunnel Configuration SSL-VPN Configuration Remote Management HTTP(S) Management Log/Syslog Configuration User & Access Configuration High Availability Remote Access VPN Keep HTTP Management disabled. Allow only HTTPS. Change HTTPS port to 8443 in case you want to use SSL-VPN in the future (that ll use TCP: 443). Enforce minimum pass length should be changed from its default value of 1 to perhaps 8. Local syslog needs to be customized. Logging for each and every packet allowed will limit its usability. We ve de-cluttered current syslog settings. Nonetheless, for longer history and better views, a better report solution should be adopted (e.g., GMS/Analyzer). Analyzer can be deployed, as current license set does contain an Analyzer license. User Access is done through SSO/LDAP. Case SR3974813 should be further pursued with support if the problem is still reproducible after the firmware upgrade. Central Site (NSA2600) should be provisioned with an HA setup that will provide redundancy and avoid single points of failure. 3

SECURITY SERVICES PRE-ENGAGEMENT STATUS RECOMMENDATIONS/IMPLEMENTED FIXES Gateway Anti-virus Partially Configure: CIFS/NetBios Intrusion Prevention Service Anti-Spyware Geo-IP Filtering Botnet Filtering Content Filtering Service DPI-SSL DPI-SSH Capture ATP Disabled Disabled Disabled, Not licensed Partially Enable Detect All for High, Med, Low. Enable Prevent All for High, Med. Set Log Redundancy for High/Med to 30s Enable Detect All for High, Med, Low. Enable Prevent All for High, Med. Set Log Redundancy for Low to 30s. Block origin countries of suspicious traffic seen in the Logs where there is no legitimate business conducted. Block connections to/from Botnet Command and Control Services with Enable Logging. In addition to default blocked categories, block the following as well: Malware, Radicalization, Pay2Surf, Hacking & Proxy Avoidance. Subject to SonicWall Certificate distribution through AD, DPI-SSL is highly recommended. 65% of traffic is missed from scanning without DPI-SSL. SSH is the backbone for many configuration, file transfer and VPN services in the wild. Inspection of DPI-SSL traffic is highly recommended. CIFS and additional file types: PDF, Office, Archives. Block file until a verdict is returned. Observations Summary While on-site, we implemented some of the above recommended changes. However, most of them should be done during a change window with due-diligence in place (config/firmware backup taken before changes). Remote Access VPN is the preferred method to access internal/centralized resources (such as internal File Sharing facilities or internal Remote Desktop Servers). Such a solution will provide opportunity to enforce the client endpoint to: have the latest operating system patch or update applied; have the anti-virus/anti-spyware endpoint software enabled with the latest updates; and restrict resource access in the event the client endpoint does not meet all the security policy criteria. Proper network segmentation with intra-zone traffic scanning should further more limit any potential threat spread horizontally. Segmented networks will slow down data breach attacks. Preventing lateral movement is ideal as there is a bigger chance for a threat to be spotted if it stays in the system longer while having its harm capabilities diminished. Network segmentation will stop an unpatched and exploited system from accessing and infecting every machine in the network (typical for ransomware). Takeaway SonicWall can help deliver network segmentation, traffic encryption, intrusion detection and prevention, zero-day threat protection and global threat intelligence protection against data exfiltration and extortion. These services can significantly reduce the attack surface around protected services and also reduce the number of assets falling in-scope of becoming PCI (or other equivalent standards) compliant. 4

Security Compliance Requirements The Security Health Check Service can assist customers with PCI: DSS or GDPR compliance requirements. PCI: DSS Security Compliance Requirements Do not store sensitive authentication data once the card authorization process has been completed. Protect actual card number with encryption. Hardened card data storage must be protected within a defined security perimeter, through a specific set of controls maintaining network security. GDPR Security Compliance Audit current approach to managing data. Establish current position and existing processes around data protection Audit of all customer data sets held across the business, including areas where PII might NOT be adequately protected. The network must also be segmented and protected, including separation of wireless networks with firewalls. Additional security elements such as intrusion detection and prevention, including other alerting mechanisms, are recommended. Remote access must use two-factor authentication. These extensive access controls must also be augmented by physical security countermeasures, including use of cameras and methods to monitor access to sensitive areas. You are required to undertake penetration testing, both annually and after major system changes. In addition, you need to undertake both internal (network and application) and external quarterly vulnerability scans. Your validation is only confirmation of your compliance at a single point in time. You need to ensure continual compliance to manage your ongoing risk of breach. With SonicWall, you can: Implement network segmentation and security access gates between business modules Protect data on mobile devices and remote offices in a similar manner to centrally held data Secure remote access and encrypt data in transit Access policy enforcement across file-sharing and other network-shared services and assets For additional details on SonicWall Partner- Service offerings visit www.sonicwall.com or contact your SonicWall Advanced Services Partner. 5

2017 SonicWall Inc. ALL RIGHTS RESERVED. SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. The information in this document is provided in connection with SonicWall Inc. and/or its affiliates products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of SonicWall products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, SONICWALL AND/OR ITS AFFILIATES ASSUME NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT. IN NO EVENT SHALL SONICWALL AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF SONICWALL AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SonicWall and/or its affiliates make no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. SonicWall Inc. and/or its affiliates do not make any commitment to update the information contained in this document. About Us SonicWall has been fighting the cyber-criminal industry for over 25 years, defending small, medium size businesses and enterprises worldwide. Our combination of products and partners has enabled a real-time cyber defense solution tuned to the specific needs of the more than 500,000 global businesses in over 150 countries, so you can do more business with less fear. If you have any questions regarding your potential use of this material, contact: SonicWall Inc. 5455 Great America Parkway Santa Clara, CA 95054 Refer to our website for additional information. www.sonicwall.com 6 2017 SonicWall Inc. ALL RIGHTS RESERVED. SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. Brochure-SecurityHealthCheck-IMAG-US-MKTG868